0930_三采成書全書系
0929~0930_開學語言展

英文書 > 全部商品

Blockchain, Metaverse and Trustworthy Systems

Debiao,He  著
Springer 出版
2025/01/27 出版
9 特價3815
立即代訂
下次再買

Applied Natural Language Processing with PyTorch 2.0

2025/01/27 出版
9 特價1479
立即代訂
下次再買

Communication and Relationships

2025/01/26 出版
9 特價2200
立即代訂
下次再買

Generative AI for Everyone

2025/01/26 出版
9 特價2013
立即代訂
下次再買

Transformer, Bert, and Gpt

2025/01/26 出版
9 特價1859
立即代訂
下次再買

Securing IoT in Industry 4.0 Applications with Blockchain

P,Kaliraj  著
2025/01/25 出版
9 特價3338
立即代訂
下次再買

Global Internet of Things and Edge Computing Summit

Springer 出版
2025/01/24 出版

This Open Access book constitutes the proceedings from the First Global Internet of Things and Edge Computing Summit, GIECS 2024, held in September 24-25, 2024, in Brussels, Belgium. The 12 full papers presented here were carefully reviewed and selected from 21 submissions. These papers have been organized under the following topical sections: Industrial Internet of Things (IIoT) and Digital Twins; Data Management, Privacy, and Trust in Distributed Systems; Edge Computing and Cross-Domain Systems.

9 特價2146
立即代訂
下次再買

Cyber Security Threats and Challenges Facing Human Life

CRC Press 出版
2025/01/23 出版
9 特價2861
立即代訂
下次再買

Cybersecurity in Global Politics

Derf Press 出版
2025/01/22 出版
9 特價2394
立即代訂
下次再買

Navigating the Cyber Maze

CRC Press 出版
2025/01/22 出版

In an era where cyber threats loom larger than ever, Navigating the Cyber Maze offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity. Authored by Matthias Muhlert, a seasoned cybersecurity expert with over 20 years of experience, this book aims to provide readers with a comprehensive understanding of cybersecurity, extending far beyond traditional IT concerns. From safeguarding smart homes to securing agricultural supply chains, Muhlert's expertise shines through in this essential guide.What sets this book apart is its unique approach to making cybersecurity accessible and enjoyable. Muhlert not only breaks down intricate concepts with clarity but also infuses humor throughout, making the learning experience both informative and entertaining. Whether you are a seasoned professional or new to the field, this book ensures you will gain valuable knowledge while having a good laugh.Key Features: Comprehensive Coverage: Explore a wide array of topics, including Return on Security Investment (RoSI), cybersecurity in energy management, and the security of smart devices. Practical Strategies: Discover actionable steps to enhance your security posture, from basic hygiene practices to complex strategic implementations. Psychological Insights: Understand the human element in cybersecurity, with chapters on the security mindset, overcoming cognitive biases, and building a cyber-resilient culture. Advanced Technologies: Delve into cutting-edge topics like quantum computing, 5G security, and the latest in deception technologies. Real-World Case Studies: Learn from detailed case studies that illustrate the application of cybersecurity principles in various industries. Engaging Humor: Enjoy 'Cyber Chuckles' scattered throughout the book, ensuring that even the most complex topics are accessible and enjoyable. Designed for a diverse audience ranging from cybersecurity professionals and IT managers to business leaders and students, Navigating the Cyber Maze is your ultimate guide to the digital frontier. Whether you are looking to enhance your technical skills, understand the broader impact of cybersecurity, or simply enjoy a good read, this book is your essential companion in the ever-evolving cyber landscape. Dive in and equip yourself with the knowledge and strategies to navigate the cyber maze with confidence and a smile.

9 特價3100
立即代訂
下次再買

Understanding the Technology Behind Online Offending

Routledge 出版
2025/01/22 出版

Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System is a non-technical explanation of online offences by a cybersecurity expert, bridging the gap between the high-tech world of cybercrime and the non-technical professionals working within it. The book begins by equipping the reader with a foundational understanding of how the internet works before exploring the various ways that people can exploit the Internet to commit crimes. The reader is then introduced to some of the sophisticated ways that individuals may evade detection before we explore the organisations fighting to prevent and capture those offending online. The book includes a contributory chapter from solicitors at Stone King LLP to help the reader understand how the law is evolving to prosecute offenders. There is a further contributory chapter from psychologist Dr Ruth J Tully who discusses psychological risk assessment with those who offend online. The book concludes with important chapters looking at how professionals can keep themselves safe online, and future directions of the internet. The book's intended audience includes all professionals who work with those who commit online offences, such as psychologists, solicitors, social workers, probation officers and police officers. The book is also suitable for those in training or graduate education.

9 特價1573
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2024

Springer 出版
2025/01/16 出版

The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.

9 特價3815
立即代訂
下次再買

AI for Beginners

2025/01/15 出版

Nervous?Nervous that coworkers get more done in less time, while your boss gives you that "I have to downsize somebody, who is the least productive?" stare?Nervous that AI is taking jobs, and your career is in trouble? You have to do something, but what?Nervous that you have to make more money? How do you plan to make that happen?There IS a SolutionYou get up to speed and learn artificial intelligence. AI for Beginners: Learn Artificial Intelligence Now and Stay Ahead of the Curve shows how to build effective prompts, detect deepfakes, create music, understand dynamic pricing and use AI ethically. You use the tool that your coworkers and competitors use to get more done in less time. They enjoy success. Do you deserve the same level of success?Success is Waiting for YouOf course you do! Claim your success. You get more done, in less time and make more money. Your boss looks at you and smiles with that, "You are my MVP, thank you for being here" look. You grow your career. You realize that what you're doing now is nice, but opportunities with more responsibility, pride and money are waiting for you.Time to Act!Get your copy of AI for Beginners: Learn Artificial Intelligence Now and Stay Ahead of the Curve today. Better opportunities are waiting for you. More free time is waiting for you. More money is waiting for you. These become yours after you buy and learn the strategies in AI for Beginners: Learn Artificial Intelligence Now and Stay Ahead of the Curve. Hurry! You're not the only one asking how AI can make their lives easier. Get ahead of the curve. Get AI for Beginners today!

9 特價581
立即代訂
下次再買

The Art of Cyber Security

Gary,Hibberd  著
Itgp 出版
2025/01/14 出版
9 特價2322
立即代訂
下次再買

Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education

2025/01/13 出版

Healthcare organizations and institutions of higher education have become prime targets of increased cyberattacks. This book explores current cybersecurity trends and effective software applications, AI, and decision-making processes to combat cyberattacks. It emphasizes the importance of compliance, provides downloadable digital forensics software, and examines the psychology of organizational practice for effective cybersecurity leadership.Since the year 2000, research consistently reports devasting results of ransomware and malware attacks impacting healthcare and higher education. These attacks are crippling the ability for these organizations to effectively protect their information systems, information technology, and cloud-based environments. Despite the global dissemination of knowledge, healthcare and higher education organizations continue wrestling to define strategies and methods to secure their information assets, understand methods of assessing qualified practitioners to fill the alarming number of opened positions to help improve how cybersecurity leadership is deployed, as well as improve workplace usage of technology tools without exposing these organizations to more severe and catastrophic cyber incidents.This practical book supports the reader with downloadable digital forensics software, teaches how to utilize this software, as well as correctly securing this software as a key method to improve usage and deployment of these software applications for effective cybersecurity leadership. Furthermore, readers will understand the psychology of industrial organizational practice as it correlates with cybersecurity leadership. This is required to improve management of workplace conflict, which often impedes personnel's ability to comply with cybersecurity law and policy, domestically and internationally.

9 特價6201
立即代訂
下次再買

Bold & Easy Life in a Jar Coloring Book

Laura,Bidden  著
Laura Bidden 出版
2025/01/13 出版

Experience the joy of coloring with the Bold & Easy Life in a Jar Coloring Book, a delightful collection of large-print, simple designs that bring everyday charm to life. Perfect for adults who prefer easy-to-color illustrations, this unique book celebrates the beauty of jars filled with inspiration, memories, and creativity. Whether you're a beginner or an experienced colorist, this book offers a relaxing and satisfying way to unwind.Features: Large-Print Designs: Bold, easy-to-color illustrations with clear lines, perfect for those who enjoy simplicity and accessibility.Jar-Themed Art: Explore a variety of charming jar-inspired designs, including jars filled with flowers, fireflies, candies, and other whimsical surprises.Relaxing and Therapeutic: A stress-free activity to help you relax, unwind, and focus on the joy of creating.High-Quality Paper: Durable pages that resist bleed-through, making it ideal for colored pencils, markers, or crayons.Suitable for All Levels: Designed for adults seeking simple, fun, and rewarding coloring experiences.Rediscover the art of relaxation with the Bold & Easy Life in a Jar Coloring Book-a celebration of life's little treasures captured in jars. Perfect for yourself or as a thoughtful gift for friends and loved ones! ����️

9 特價536
立即代訂
下次再買

Advanced Malware Analysis and Intelligence

2025/01/13 出版
9 特價2013
立即代訂
下次再買

Learning Php, MySQL & JavaScript

Nixon  著
O'Reilly Media 出版
2025/01/10 出版

Build interactive, data-driven websites with the potent combination of open source technologies and web standards, even if you have only basic HTML knowledge. With the latest edition of this popular hands-on guide, you'll tackle dynamic web programming using the most recent versions of today's core technologies: PHP, MySQL, JavaScript, CSS, HTML5, jQuery, Node.js, and the powerful React library. Web designers will learn how to use these technologies together while picking up valuable web programming practices along the way, including how to optimize websites for mobile devices. You'll put everything together to build a fully functional social networking site suitable for both desktop and mobile browsers. Explore MySQL from database structure to complex queries Use the MySQL PDO extension, PHP's improved MySQL interface Create dynamic PHP web pages that tailor themselves to the user Manage cookies and sessions and maintain a high level of security Enhance JavaScript with the React library Use Ajax calls for background browser-server communication Style your web pages by acquiring CSS skills Implement HTML5 features including geolocation, audio, video, and the canvas element Reformat your websites into mobile web apps

9 特價1890
立即代訂
下次再買

Fun with Designing

Vinay,Bhatt  著
2025/01/10 出版
9 特價387
立即代訂
下次再買

Network Communication Protocols

Ghassan,Abed  著
Scholars' Press 出版
2025/01/10 出版
9 特價3257
立即代訂
下次再買

Metasploit, 2nd Edition

No Starch Press 出版
2025/01/09 出版

The new and improved guide to penetration testing using the legendary Metasploit Framework. Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers. Written by renowned ethical hackers and industry experts, this fully updated second edition includes: Advanced Active Directory and cloud penetration testingModern evasion techniques and payload encodingMalicious document generation for client-side exploitationCoverage of recently added modules and commands Starting with Framework essentials--exploits, payloads, Meterpreter, and auxiliary modules--you'll progress to advanced methodologies aligned with the Penetration Test Execution Standard (PTES). Through real-world examples and simulated penetration tests, you'll: Conduct network reconnaissance and analyze vulnerabilitiesExecute wireless network and social engineering attacksPerform post-exploitation techniques, including privilege escalationDevelop custom modules in Ruby and port existing exploitsUse MSFvenom to evade detectionIntegrate with Nmap, Nessus, and the Social-Engineer ToolkitWhether you're a cybersecurity professional, ethical hacker, or IT administrator, this second edition of Metasploit: The Penetration Tester's Guide is your key to staying ahead in the ever-evolving threat landscape.

9 特價1890
立即代訂
下次再買

Waves of Trust

2025/01/07 出版

The title of this book accurately reflects the figure of Rino Falcone, a scientist whose contributions have provided important insights into several central themes of research, with particular reference to the fields of agent theory, multi-agent systems, and artificial intelligence. Alongside Cristiano Castelfranchi, Rino Falcone has made a fundamental contribution to understanding and systematizing the concept of trust in human interactions, in the relationship between humans and technology, and in interactions between humans and artificial intelligent agents. Throughout his work, Falcone has consistently prioritized a broad interdisciplinary theoretical analysis, focused especially on the search for regulatory principles that transcend mere application domains.His scientific production has always been accompanied by a passionate socio-political commitment, which has decisively marked the history of the Institute of Cognitive Sciences and Technologies (ISTC-CNR), of which he has been a part since its inception and which he directed for nearly 9 years, and more broadly of Italian research. In addition to leading the ISTC, Falcone has held numerous prominent institutional roles, successfully advocating for a vision of science as a driver of social progress.Through a series of contributions and testimonies from eminent Italian and international scientists, politicians, and public figures whose experiences have intersected with those of Rino Falcone, this volume seeks to explore the implications of his scientific activity and also aims to delve into profound reflection on the dynamic relationship between science, society, and politics. In an era of profound technological transformations like the one we are experiencing, Rino Falcone has positioned himself as a figure capable of uniting scientific rigor with the ability to promote deep and current reflection on the role of science as a paradigm in the construction of a more just, sustainable, and humane society.

9 特價1269
立即代訂
下次再買

Don't Be the Weakest Link

2025/01/07 出版

Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape.Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link!

9 特價630
立即代訂
下次再買

Ghidra Software Reverse-Engineering for Beginners - Second Edition

Packt 出版
2025/01/07 出版

Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey Features: - Make the most of Ghidra on different platforms such as Linux, Windows, and macOS- Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting- Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Written by David ?lvarez P矇rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges.By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.What You Will Learn: - Develop and integrate your own Ghidra extensions- Discover how to use Ghidra in headless mode- Extend Ghidra for advanced reverse-engineering- Perform binary differencing for use cases such as patch and vulnerability analysis- Perform debugging locally and in a remote environment- Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware- Automate vulnerability detection in executable binaries using Ghidra scriptingWho this book is for: This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended.Table of Contents- Getting Started with Ghidra- Automating RE Tasks with Ghidra Scripts- Ghidra Debug Mode- Using Ghidra Extensions- Reversing Malware Using Ghidra- Scripting Malware Analysis- Using Ghidra's Headless Analyzer- Binary Diffing- Auditing Program Binaries- Scripting Binary Audits- Developing Ghidra Plugins- Incorporating New Binary Formats- Analyzing Processor Modules- Contributing to the Ghidra Community- Extending Ghidra for Advanced Reverse-Engineering- Debugging- Unpacking in-the-Wild Malware- Reverse-Engineering Ransomware

9 特價1904
立即代訂
下次再買

Industrial Internet of Things

Silky,Goel  著
2025/01/06 出版

Industrial Internet of Things: An Introduction explores the convergence of IoT and machine learning technologies in transforming industries and advancing economic growth. This comprehensive guide examines foundational principles, innovative applications, and real-world case studies that showcase the power of IoT-enabled intelligent systems in enhancing efficiency, sustainability, and adaptability.The book is structured into five parts. The first part introduces industrial IoT concepts, including algorithms, deep learning prediction models, and smart production techniques. The second section addresses machine learning and collaborative technologies, focusing on artificial neural networks, and AI's role in healthcare and industrial IoT. Subsequent chapters explore real-world applications, such as IoT adoption in healthcare during COVID-19 and intelligent transportation systems. The final sections address advanced IIoT progressions and the role of IoT in energy production using byproducts. Key Features: - Foundational concepts and algorithms for industrial IoT.- Integration of machine learning in IoT systems.- Case studies on healthcare, transportation, and sustainability.- Insights into energy production using IoT.

9 特價2283
立即代訂
下次再買

Deconstructing Digital Capitalism and the Smart Society

2025/01/04 出版

Today's critics of big online platforms tend to consider privacy breaches, monopolistic practices, and the deployment of surveillance technologies as the main problems. Internet reformers suggest the answers to these issues reside in more--and better--regulations. While the questions of privacy, data, and size are indeed important, they are secondary however to a deeper set of concerns about platform ownership and control, and who benefits from the current status quo. This book examines these issues and offers an historical overview and in-depth analysis of digital capitalism and its prevailing practices as it has become increasingly intertwined with various forms of online surveillance, behavior modification, and the delegation of managerial functions to algorithmic and automated systems in platform economies. The approach taken extends to the wider array of data-driven, internet-connected and automated systems that involve digital devices and technologies centered on three "smart" spaces: the smart self, the smart home, and the smart city. Antitrust and other regulatory measures by the European Union and the United States that are aimed at restraining platform capitalism are also discussed. The focus in particular is on recent developments regarding artificial intelligence and their potentially harmful implications. This is followed by a critical look at proposals for more far-reaching institutional reforms revolving around the creation of forms of "platform socialism" that build partly on existing practices of platform cooperativism. The book concludes with a diagnosis of the global situation among the competing "digital empires" (the United States, the European Union, and China), and considers whether or not, under the present conditions, any form of democratic platform socialism could materialize on a wider scale in the near future.

9 特價3510
立即代訂
下次再買

Privacy in Vehicular Networks

Baihe,Ma  著
CRC Press 出版
2025/01/03 出版

In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge. This book delves into the complexities of protecting sensitive location data within the dynamic and decentralized environment of vehicular networks.

9 特價3100
立即代訂
下次再買

Machine Learning with PyTorch and Scikit-Learn

Packt 出版
2025/01/03 出版

This book of the bestselling and widely acclaimed Python Machine Learning series is a comprehensive guide to machine and deep learning using PyTorch's simple to code framework.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesLearn applied machine learning with a solid foundation in theoryClear, intuitive explanations take you deep into the theory and practice of Python machine learningFully updated and expanded to cover PyTorch, transformers, XGBoost, graph neural networks, and best practicesBook DescriptionMachine Learning with PyTorch and Scikit-Learn is a comprehensive guide to machine learning and deep learning with PyTorch. It acts as both a step-by-step tutorial and a reference you'll keep coming back to as you build your machine learning systems.Packed with clear explanations, visualizations, and examples, the book covers all the essential machine learning techniques in depth. While some books teach you only to follow instructions, with this machine learning book, we teach the principles allowing you to build models and applications for yourself.Why PyTorch?PyTorch is the Pythonic way to learn machine learning, making it easier to learn and simpler to code with. This book explains the essential parts of PyTorch and how to create models using popular libraries, such as PyTorch Lightning and PyTorch Geometric.You will also learn about generative adversarial networks (GANs) for generating new data and training intelligent agents with reinforcement learning. Finally, this new edition is expanded to cover the latest trends in deep learning, including graph neural networks and large-scale transformers used for natural language processing (NLP).This PyTorch book is your companion to machine learning with Python, whether you're a Python developer new to machine learning or want to deepen your knowledge of the latest developments.What you will learnExplore frameworks, models, and techniques for machines to 'learn' from dataUse scikit-learn for machine learning and PyTorch for deep learningTrain machine learning classifiers on images, text, and moreBuild and train neural networks, transformers, and boosting algorithmsDiscover best practices for evaluating and tuning modelsPredict continuous target outcomes using regression analysisDig deeper into textual and social media data using sentiment analysisWho this book is forIf you have a good grasp of Python basics and want to start learning about machine learning and deep learning, then this is the book for you. This is an essential resource written for developers and data scientists who want to create practical machine learning and deep learning applications using scikit-learn and PyTorch.Before you get started with this book, you'll need a good understanding of calculus, as well as linear algebra.Table of ContentsGiving Computers the Ability to Learn from DataTraining Simple Machine Learning Algorithms for ClassificationA Tour of Machine Learning Classifiers Using Scikit-LearnBuilding Good Training Datasets - Data PreprocessingCompressing Data via Dimensionality ReductionLearning Best Practices for Model Evaluation and Hyperparameter TuningCombining Different Models for Ensemble LearningApplying Machine Learning to Sentiment AnalysisPredicting Continuous Target Variables with Regression AnalysisWorking with Unlabeled Data - Clustering AnalysisImplementing a Multilayer Artificial Neural Network from Scratch(N.B. Please use the Look Inside option to see further chapters)

9 特價3384
立即代訂
下次再買

Information and communication techniques course 4th year

2025/01/03 出版

Our aim in writing this book for fourth-year Humanities Science students is to support the national curriculum for this option, which is rich in Information and Communication Technologies (ICT). In this book, we have developed related notions on computer networks, social networks, client-server systems, artificial intelligence and other notions oriented towards different algorithms. The book is based on the national curriculum for the year 2021.It should also be pointed out that this book has been written with a great deal of courage and love, in order to raise the level of knowledge of our science option students and bring up to date our ICT teachers who have not been able to tackle their computer studies up to degree level.

9 特價3511
立即代訂
下次再買

The Chief AI Officer’s Handbook

Packt 出版
2025/01/03 出版

Empower your leadership with this detailed guide for CAIOs and business leaders to drive innovation, address complex challenges, and implement ethical AI strategiesKey Features: - Explore practical frameworks for effective AI team building and team management- Learn from case studies illustrating successful AI implementations- Gain actionable advice for leveraging AI to drive innovation and strategic growth- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Chief Artificial Intelligence Officers (CAIOs) are now imperative for businesses, enabling organizations to achieve strategic goals and unlock transformative opportunities through the power of AI. By building intelligent systems, training models to drive impactful decisions, and creating innovative applications, they empower organizations to thrive in an AI-driven world. Written by Jarrod Anderson, Chief AI Officer at SYRV.AI, this book bridges the gap between visionary leadership and practical execution.This handbook reimagines AI leadership for today's fast-paced environment, leveraging predictive, deterministic, generative, and agentic AI to address complex challenges and foster innovation. It provides CAIOs with the strategies to develop transformative AI initiatives, build and lead elite teams, and adopt AI responsibly while maintaining compliance. From shaping impactful solutions to achieving measurable business outcomes, this guide offers a roadmap for making AI your organization's competitive edge.By the end of this book, you'll have the knowledge and tools to excel as a Chief AI Officer, driving innovation, strategic growth, and lasting success for your organization.What You Will Learn: - Develop effective AI strategies for business growth- Build and manage high-performing AI teams- Implement advanced AI systems successfully- Navigate ethical and compliance challenges in AI- Apply practical frameworks to real-world AI problems- Drive innovation through AI-driven solutions- Align AI initiatives with strategic business goalsWho this book is for: This book is for chief AI officers, business leaders, AI and data science professionals, IT managers, entrepreneurs, consultants, academic leaders, policymakers, and general business professionals. This diverse audience seeks to understand not only the technical intricacies of AI, but also how to leverage AI to solve real-world business problems, drive innovation, and achieve strategic goals.Table of Contents- Why Every Company Needs a Chief AI Officer- Key Responsibilities of a Chief AI Officer- Crafting a Winning AI Strategy- Building High-Performing AI Teams- Data - the Lifeblood of AI- AI Project Management- Understanding Deterministic, Probabilistic, and Generative AI- AI Agents and Agentic Systems- Designing AI Systems- Training AI Models- Deploying AI Solutions- AI Governance and Ethics- Security in AI Systems- Privacy in the Age of AI- AI Compliance- Conclusion- Appendix

9 特價2115
立即代訂
下次再買

Data Management and Security in Blockchain Systems

2025/01/02 出版

Data Management and Security in Blockchain Systems offers a comprehensive exploration of how blockchain technology is reshaping the landscape of data management and security. This book addresses key aspects of blockchain-based systems, including data integrity, transparency, and tamper resistance, making it an essential resource for students, researchers, and professionals. Covering topics from blockchain-enabled IoT traffic management to the integration of AI for enhanced security, this book presents solutions to current challenges such as cyberattacks, smart grid security, and scalable network designs. Each chapter is thoughtfully structured to provide readers with a solid understanding of blockchain applications in diverse domains. Perfect for those seeking to understand blockchain's potential to secure and manage data in an increasingly interconnected world. Key Features: - Comprehensive overview of data management and security in blockchain networks.- Practical insights into IoT, smart grids, and AI integration.- In-depth analysis of cybersecurity challenges and solutions.

9 特價2090
立即代訂
下次再買

Current and Future Cellular Systems

2025/01/02 出版

Comprehensive reference on the latest trends, solutions, challenges, and future directions of 5G communications and beyond 5G for Future Generation Communication Systems covers the state of the art in architectures and solutions for 5G wireless communication and beyond. This book is unique because instead of focusing on singular topics, it considers various technologies being used in conjunction with 5G and beyond 5G technologies. All new and emerging technologies are covered, along with their problems and how quality of service (QoS) can be improved with respect to future requirements. This book highlights the latest trends in resource allocation techniques due to different device (or user) characteristics, provides a special focus on wide bandwidth millimeter wave communications including circuitry, antennas, and propagation, and discusses the involvement of decision-making processes assisted by artificial intelligence/machine learning (AI/ML) in applications such as resource allocation, power allocation, QoS improvement, and autonomous vehicles. Readers will also learn to develop mathematical modeling, perform simulation setup, and configure parameters related to simulations. 5G for Future Generation Communication Systems includes information on: The Internet of Vehicles (IoV), covering requirements, challenges, and limitations of Cellular Vehicle-to-Everything (C-V2X) with Resource Allocation (RA) techniques Intelligent reflecting surfaces, unmanned aerial vehicles, power optimized frameworks, challenges in a sub-6 GHz band, and communication in a THz band The role of IoT in healthcare, agriculture, smart home applications, networking requirements, and the metaverse Quantum computing, cloud computing, spectrum sharing methods, and performance analysis of WiFi 6/7 for indoor and outdoor environments Providing expansive yet accessible coverage of the subject by exploring both basic and advanced topics, 5G for Future Generation Communication Systems serves as an excellent introduction to the fundamentals of 5G and its applications for graduate students, researchers, and industry professionals in the field of wireless communication technologies.

9 特價5711
立即代訂
下次再買

Security and Privacy in New Computing Environments

Jun,Cai  著
Springer 出版
2025/01/02 出版

This book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023. The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics.

9 特價4054
立即代訂
下次再買

AI-Powered Search

2025/01/01 出版

Learn everything about the latest machine learning techniques and create search engines that drive more domain-aware and intelligent search. AI-Powered Search teaches you the latest machine-learning techniques to create search engines that continuously learn from your users and your content. Written by Trey Grainger, the Chief Algorithms Officer at Lucidworks, this authoritative book empowers you to create and deploy search engines that take advantage of user interactions and hidden semantic relationships. This book is ideal for software developers or data scientists familiar with the basics of search engine development. It will show you ways to create content that will constantly get smarter and automatically deliver better, more relevant search experiences. What's inside Reflected intelligence to continually learn and improve search relevancy Natural language search with automatically-learned knowledge graphs Semantic search, with domain-specific terms, phrases, concepts, and relationships Personalised search, utilising user behavioural signals and learned user profiles Automated Learning to Rank (machine-learned ranking) from user signals Word embeddings, vector search, question answering, image and voice search, and other modern search paradigms About the technology The search box has become the "de facto" user interface for modern data-driven applications. Users expect the software to fully understand their search inputs, context, and activity and return the right answers, every time. Fortunately, you no longer need a massive team manually adjusting relevancy parameters to deliver optimal search results. Using the power of AI, you can develop search solutions that dynamically learn from your content and users, constantly getting smarter and delivering better answers.

9 特價2961
立即代訂
下次再買

Cyber Threat Hunting

2025/01/01 出版

Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework to see and stop attacks. In Cyber Threat Hunting you will learn how to: - Design and implement a cyber threat hunting framework - Think like your adversaries - Conduct threat hunting expeditions - Streamline how you work with other cyber security teams - Structure threat hunting expeditions without losing track of activities and clues - Use statistics and machine learning techniques to hunt for threats Organizations that actively seek out security intrusions reduce the time that bad actors spend on their sites, increase their cyber resilience, and build strong resistance to sophisticated covert threats. Cyber Threat Hunting teaches you to recognize attempts to access your systems by seeing the clues your adversaries leave behind. It lays out the path to becoming a successful cyber security threat hunter, guiding you from your very first expedition to hunting in complex cloud-native environments. Foreword by Anton Chuvakin. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology Right now, an intruder may be lurking in your network, silently mapping your infrastructure and siphoning off sensitive data. Can you spot the subtle signs? Cyber threat hunting is a security practice aimed at uncovering network and software threats that slip past monitoring and detection systems, and other reactive techniques. In this practical book, author Nadhem AlFardan uses real-world scenarios to help you think like a threat hunter and maximize the success of your expeditions. About the book Cyber Threat Hunting teaches you how to conduct structured expeditions using techniques that can detect even the most sophisticated cybersecurity challenges. You'll begin by mastering the fundamentals: formulating a threat hypothesis, gathering intelligence, strategizing your approach, and executing your hunt. From there, you'll explore advanced techniques, including machine learning and statistical analysis for anomaly detection. Using this book's downloadable datasets and scenario templates, you'll get the hands-on experience you need to refine your threat-hunting expertise. What's inside - A threat hunting framework and toolkit - Think like an adversary - Effective threat hunting operations About the reader For security, network, and systems professionals with some Python experience. About the author Nadhem AlFardan, a distinguished architect, leads the Security Operation Center practice team in Cisco Customer Experience, APJC. Table of Contents Part 1 1 Introducing threat hunting 2 Building the foundation of a threat-hunting practice Part 2 3 Your first threat-hunting expedition 4 Threat intelligence for threat hunting 5 Hunting in clouds Part 3 6 Using fundamental statistical constructs 7 Tuning statistical logic 8 Unsupervised machine learning with k-means 9 Supervised machine learning with Random Forest and XGBoost 10 Hunting with deception Part 4 11 Responding to findings 12 Measuring success 13 Enabling the team Appendix A Useful Tools

9 特價2538
立即代訂
下次再買

Don't Be the Weakest Link

2025/01/01 出版

This is the Bionic Reading(R) edition for readers with ADHD.Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape. Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link! Short Description on Ingram: Learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps.

9 特價945
立即代訂
下次再買

Don't Be the Weakest Link

2025/01/01 出版

Shayne and Charles bring over 50 years of security and privacy expertise to this masterfully crafted blueprint for surviving in this new digital landscape. Introducing the Weakest Link Scale, this book helps you improve your Knowledge Rank and learn to adapt to your Response Rank, empowering you to learn at your own pace and respond to threats securely. Packed with real-world examples and easy-to-follow advice, you will learn how to create great passwords and spot phishing scams while mastering tools like password managers and multi-factor authentication. This book turns complex cybersecurity concepts into simple, actionable steps. Written for everyday people, not tech experts, Don't Be the Weakest Link equips you with the tools to protect what matters most-your personal information. Don't just survive the digital age-thrive in it while learning how to NOT be the weakest link!

9 特價630
立即代訂
下次再買

Artificial Intelligence and Financial Security

2024/12/31 出版

DESCRIPTION This book "Artificial Intelligence and Financial Security" explores the transformative power of AI in enhancing and safeguarding financial systems. This comprehensive guide looks into AI-driven solutions for fraud detection, risk management, regulatory compliance, and market forecasting.With detailed case studies, actionable insights, and expert analyses, the book equips the readers to tackle emerging challenges in financial security. It provides a deep dive into cutting-edge technologies like ML, blockchain, and AI-powered cybersecurity, while highlighting the critical importance of ethical considerations and compliance with financial regulations. Each chapter is thoughtfully structured to guide readers from foundational concepts to practical strategies and insights into future trends in AI-driven finance.By the end of this book, you will be well-positioned to understand how AI is shaping the future of financial security. You will possess the knowledge to make informed financial decisions and navigate the increasingly AI-driven financial landscape with confidence.WHAT YOU WILL LEARN● Understanding the role of AI in securing and optimizing financial systems.● Detect fraud and manage risks using AI-driven strategies.● Apply ML for predictive analytics and anomaly detection.● Integrate blockchain and AI for enhanced financial security.● Navigate ethical and regulatory challenges in AI implementation.● Forecast trends and prepare for AI-driven financial innovation.WHO THIS BOOK IS FORThis book is for financial professionals, AI practitioners, researchers, and policymakers seeking to understand and apply AI in financial security. A basic understanding of finance, technology, or AI concepts is helpful but not mandatory, as the book provides foundational explanations alongside advanced insights.

9 特價1913
立即代訂
下次再買

Distributed Computing and Intelligent Technology

Springer 出版
2024/12/31 出版

This volume LNCS constitutes the refereed proceedings of the 21st International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2025, in Bhubaneswar, in India, in January 2025. ICDCIT is organized into two tracks: Distributed Computing (DC) and Intelligent Technology (IT). The DC track solicits original research papers contributing to the foundations and applications of distributed computing. The DC track PC accepted 10 papers (7 regular papers and 3 short papers), and the IT track PC accepted 8 regular papers, The conference presents and discusses results and ideas on the foundations and applications of distributed computing and intelligent technology.

9 特價3100
立即代訂
下次再買

Information and communication techniques course 7th EB

2024/12/30 出版

This theoretical and practical work, which is easy to understand for pupils in the seventh year of basic education, will also serve as a compendium for teachers wishing to learn computer science, as it conforms to the national curriculum for primary, secondary and technical education in the Democratic Republic of Congo. In this book, we have focused on notions such as: mastering general computer concepts, presenting the computer, discovering computer peripherals, Windows fundamentals, directory files, search engine browsers, different websites, using e-mail, attachments and handling MS Word. If you follow this book through to the end, you'll be well on your way to the sixth year of the humanities, and the concepts covered in the fourth year will no longer be a problem. We look forward to receiving your comments, criticisms and suggestions for improving this book, and encourage every school to acquire a copy.

9 特價2707
立即代訂
下次再買

Introduction to 5G Technology

This textbook provides a comprehensive introduction to 5G technology, exploring both the underlying principles and its wide-ranging applications. The book is designed for students, researchers, and professionals seeking to understand the key concepts, architecture, and features of 5G networks. It delves into the evolution of mobile communication systems, from 1G to 4G, and presents a detailed overview of the advancements that make 5G distinct. The text covers essential topics such as the 5G network architecture, key enabling technologies (including millimetre waves, small cells, massive MIMO, and beam forming), and the role of network slicing and virtualization. It explores the impact of 5G on various industries, including telecommunications, healthcare, automotive, and smart cities, providing real-world examples of applications and use cases. With clear explanations, illustrative diagrams, and practical case studies, the book not only addresses the theoretical foundations but also emphasizes the practical implications and challenges in the deployment of 5G technology. It is an essential resource for anyone seeking to gain a solid understanding of 5G's potential.

9 特價2707
立即代訂
下次再買

Establish an Insider Threat Program under NISPOM

2024/12/28 出版

Establish an Insider Threat Program Under NISPOM focuses on protecting classified information. It also answers the question that so many people have asked, If we have the NISPOM, why do we need an insider threat program?If the NISPOM is so thorough, what would an additional insider threat program look like?Most organizations attack the problem with either an employee tracking or online activity reporting goal.After asking the above questions, we recommend a different solution. Of course the employee reporting and activity tracking solutions are important and part of the solution, but they should not be the end goal.This book recommends a different application that can easily be implemented to both resolve insider threat issues and demonstrate compliance.Establishing an Insider Threat Program Under NISPOM is written primarily for cleared defense contractors to meet Insider Threat Program requirements under the cognizance of the U.S. Government (Defense Counterintelligence and Security Agency (DCSA)).Our recommended approach and practices help reduce vulnerabilities without negatively impacting the work force. You will learn to be innovative in your approach as well as leverage industry best practices for a more effective ITP. These solutions incorporate a systems-based approach that meets the following criteria: Document what needs to be protectedEstablish countermeasures to limit accessMeet reporting requirements for unauthorized accessTrain the workforceThis book provides tools and templates that you can use immediately to document your progress and demonstrate program during reviews.This book includes: Insider Threat Program Templates, tools and productsSample training certificatesSpreadsheets for documenting risk

9 特價1004
立即代訂
下次再買

Angular Masterclass

Souvik,Basu  著
2024/12/27 出版

DESCRIPTION Angular is a popular JavaScript framework that empowers developers to create single-page applications (SPAs) with ease. This comprehensive guide is designed to equip you with the skills and knowledge to become a proficient Angular developer, even if you are starting from scratch.This book offers a step-by-step guide to mastering Angular development. It starts with setting up your environment, using Angular CLI for efficient project management, and creating reusable components that form the core of any Angular app. You will learn data binding to connect data with your user interface and routing to guide users through your app's sections. The book covers TypeScript basics, Angular's primary language, and component lifecycle hooks for managing behavior at different stages. Advanced topics include handling user input with reactive forms, testing for quality assurance, and deploying your application effectively. Additionally, it covers styling to create attractive designs and accessibility practices to ensure your applications are usable for everyone.By the end of this masterclass, you will be well-equipped to confidently build modern, interactive, and user-friendly web applications using the power of Angular.WHAT YOU WILL LEARN● Optimize Angular applications for performance and responsiveness.● Utilize advanced Angular features like lazy loading and preloading. ● Optimize applications using change detection strategies and performance profiling. ● Debug production issues effectively with monitoring, telemetry tools, and error-handling mechanisms.● Implement internationalization (i18n) for multilingual applications. ● Explore component lifecycle and its management.WHO THIS BOOK IS FORThis book is ideal for aspiring and intermediate web developers, front-end engineers, and anyone interested in building dynamic web applications. Prior experience to basic JavaScript is recommended, but no prior knowledge of Angular is required.

9 特價2013
立即代訂
下次再買

Principles and Applications of Blockchain Systems

Hui,Liu  著
2024/12/27 出版

Technical theory, key technologies, and practical applications for consortium blockchains, with a solution to the CAP trilemma problem Principles and Applications of Blockchain Systems provides a comprehensive introduction to consortium blockchains, including the physical, network, consensus, and contract layers, covering technical theory, key technologies, and practical applications. Beyond the technical side, this book visually showcases the application potential of consortium blockchains, with information on implementation cases in network management (Multi-Identifier System) and secure storage (Mimic Distributed Storage System). This book thoroughly addresses the CAP trilemma problem for consortium blockchains, a major barrier to scalability, by presenting a novel quantifiable impossibility triangle with a solution. Additionally, optimization techniques in consortium blockchains, such as P2P protocols for future networks and consensus algorithms, are discussed in detail. Written by two highly qualified academics with significant experience in the field, Principles and Applications of Blockchain Systems discusses sample topics such as: Peer-to-peer networks in consortium blockchains, covering P2P network architecture and node discovery, data synchronization, and gossip protocols Basic concepts of distributed consistency, including the SMR model in blockchain systems, assumptions for distributed networks, and the Byzantine general's problem Consensus mechanisms evolution process from voting-based, including PBFT, RPCA, SCP, and CoT; to proof-based including PoW, PoS, and PoX; finally optimized by fusion both voting-based and proof-based, including PoV, PPoV, HotStuff. Types of vulnerability for smart contracts, covering solidity code, EVM execution, and blockchain system layers Historical trend of upgrade from electronic consensus to quantum consensus. With highly comprehensive coverage of the subject, Principles and Applications of Blockchain Systems serves as an ideal textbook for blockchain students and researchers, and a valuable reference book for engineers and business leaders involved in developing real-world blockchain systems.

9 特價5922
立即代訂
下次再買

Frontiers in Cyber Security

Biwen,Chen  著
Springer 出版
2024/12/26 出版

This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024. The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions. The papers are organized in the following topical sections: Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation. Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.

9 特價3815
立即代訂
下次再買
頁數10/95
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing